FIELD OF THE INVENTION
[0001] The present invention generally relates to an access system including a wireless
user device and a proximity verification device. More particularly, the present invention
pertains to an access system which receives a request for access from a user's mobile
phone.
BACKGROUND
[0002] In the United States alone there are more than 4.5 million hotel rooms available
to travelers. Currently, these hotel rooms have an industry-wide occupancy rate of
just over 60%, with the occupancy rates of various geographic areas and individual
hotels varying wildly. This occupancy rate often drastically affects the bottom line
of a hotel or hotel chain. To increase their occupancy rate, and thus their profitability,
hotels make every attempt to please their guests in order to encourage them to return.
In order to please their guests, and lure new ones, hotels have continuously added
amenities, such as on-site spas, restaurants, fitness centers, and in-room coffee
machines or mini-bars.
[0003] In addition to these additional amenities, hotels have adopted a variety of different
check-in procedures to minimize the time required for a guest to check-in. These procedures
include adopting electronic key cards as opposed to mechanical keys, which enhances
guest security and allows the hotel to change to a new room key, alleviating the need
for the guest to return the keys to the front desk at check out However, even these
procedures still present a distracting delay to a hotel's most valuable customers,
business travelers. To increase loyalty amongst these frequent travelers, among others,
most major hotel chains have invested tremendous assets in developing rewards programs,
such as the Hilton HHonors® Program. The goal of these programs is to allow hotel
chains to better understand the needs of travelers and make their stay as streamlined
as possible. For instance, some hotels provide express check-in for a select set of
their guests, while others provide check-in/check-out over the Internet or via a computer
kiosk located in the hotel lobby. While these advances have certainly increased the
occupancy rates of the various major hotel chains, they have not yet solved the problem
of fully automating the guest check-in/check-out process, thereby allowing a guest
to arrive at their hotel and enter their room without any additional time-consuming
steps.
[0004] For background, it is known in the prior art, as evidenced by
U.S. 2006/164205A1 to Buckingham, to accomplish the selective activation of door locks which make us
of radio-frequency identification (RFID). Specifically, the system of Buckingham includes
a locking device positioned on a door. The locking device is operable to attempt to
verify a potential entrant's credentials, and if verified, permit access by unlocking
the door. The credentials are typically a magnetic stripe card, smart card or proximity
card and the locking device is typically powered by battery and can work as part of
a mesh network with other locking devices. However, this and other operations leads
to battery drain. Thus, Buckingham also suggest that an activation system (i.e. a
gateway device) be added which enables the lock mechanism to sleep during period of
non-use thereby extending its battery life. The activation system of Buckingham does
not play a role in the verification of the potential entrant's credentials, but rather
serves to notify the locking device of the presence of the potential entrant and the
potential need for the locking device to perform its potential authentication process.
Buckingham does not suggest detecting a signal strength from a user device and ensuring
that it falls within a predetermined range as a condition precedent to authorizing
an unlock request.
[0005] In a first aspect of the invention there is provided an access system allowing a
user to access a structure using a wireless user device, the access system comprising:
the wireless user device, a database storing access permissions identifying at least
one wireless user device authorized to access said structure and one access node authorized
to permit access to said structure; a mechanical locking device securing a door of
said structure, said locking device having a short-range wireless receiver suitable
for receiving unlock commands and being configured to unlock said door upon receiving
an unlock command; an access node positioned near said structure comprising: a first
short-range wireless radio for receiving a wireless unlock request directly from a
wireless user device, and for subsequently and conditionally transmitting an unlock
request, wherein said wireless user device is configured to, once said wireless user
device is within range of and is connected to said access node, transmit said wireless
unlock request to the access node; and a second short-range wireless radio for transmitting
an unlock command to said mechanical locking device to permit access to said structure
in response to receiving a confirmation of an authenticated unlock request; and a
server operable to receive the unlock request associated with a wireless user device
and a structure from said first short-range wireless radio of said access node to
authenticate the received unlock request using said database and to transmit a confirmation
of an authenticated unlock request to said access node upon authenticating said unlock
request using said database, wherein said unlock request is authenticated only if
received from an access node authorized to permit access to said structure and originated
from a wireless user device authorized to access said structure; and characterized
in that said access node is configured to determine the distance between itself and
the wireless user device using the signal strength of the unlock request received
from the wireless user device and to authorize the transmission of said unlock request
to the server by the first short wireless radio if the determined distance is less
than a predefined distance minimum and to forbid the transmission of said unlock request
if the predetermined distance is greater than the predefined distance.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006]
FIG. 1 is a diagrammatic view of an access system according to one implementation
of the present invention.
FIG. 2 is a process flow diagram illustrating one set of steps performed in enabling
a user to access a structure using a wireless device and the novel access system.
FIG. 3 is a process flow diagram illustrating one set of steps performed in providing
access to structure to a user using a wireless device and the novel access system.
FIG. 4 is a diagrammatic view of a token suitable for use in one embodiment of the
present invention.
DETAILED DESCRIPTION
[0007] For the purposes of promoting and understanding of the principles of the invention,
reference will now be made to the embodiment illustrated in the drawings and specific
language will be used to describe the same. It will nevertheless be understood that
no limitation of the scope of the invention as defined by the appended claims is thereby
intended.
[0008] Currently, systems exist, such as the Signature RFID/NFC system from VingCard, which
provide a user access to a hotel room using their mobile phone. However, such systems
all require a specialized transceiver within the door of the hotel room and the user's
mobile phone such that the two may communicate using a short-range wireless technology.
Only a slight fraction of existing mobile phones are currently capable of being used
with such systems, and it may be quite some time before such technology is common,
if ever.
[0009] Other technologies exist for remotely allowing a user to monitor and control the
open or closed state of an entryway, such as a garage door, using a cell phone connected
to a controller over the Internet. However, these technologies do not provide sufficient
security as they are designed for purposes other than secure access control. For example,
these systems allow a user to send a command to open a door from any location where
they have Internet access. However, their unlimited availability also introduces several
significant vulnerabilities to unauthorized access. As such, many problems exist in
the prior art which are solved by the secure access system of the present invention.
[0010] As shown in FIG. 1, one embodiment of an access system 20 advantageously permits
a user to access a structure 40 using a wireless device 24. In addition to lodging
and workplace access systems, it will be appreciated that similar embodiments of the
access system to be described also encompass systems for controlling access to other
structures or openings/doors thereof. In the illustrated embodiment, according to
FIG. 1, the described system comprises an access system 20 for allowing a hotel guest
to access their assigned hotel room 40 using a wireless device 24, which in the preferred
form, is the user's Bluetooth® capable cell phone 22 or other wireless appliance 28.
As such, it will be understood that many of the descriptions herein with respect to
a hotel environment and the like are meant for illustrative purposes and that the
concepts herein are generally applicable to a general safety and security access system
and are not limited to only a hotel room access system.
[0011] Examples of other structures for which the novel access system may be adapted include
other rooms within a hotel (i.e. workout rooms, pools, VIP lounges), office buildings,
school/university buildings, warehouses, and portions thereof, event ticket gates/turnstiles,
movie theatres, safety deposit boxes, mailboxes, lockers, or other enclosures for
which providing selective user access is desired.
[0012] Additionally, as explained later, access system 20 may also provide the user with
various features including, but not limited to, automated check-in/check-out via an
electronic kiosk or their wireless device, access to restricted members-only areas
or lounges, and the like. Other features of access system 20 include the ability to
request various reports on activity relating to the entry of various structures. Illustratively,
some embodiments of the access system 20 allow the system to provide an activity log
that reports the access requests during a specified period of time or for a specified
user.
[0013] As shown in FIG. 1, according to the illustrative embodiment, the access system 20
interfaces with one or more wireless devices 24, such as cell phone 22 or wireless
appliance 28, to allow a user to access their assigned hotel room. Cell phone 22 is
preferably a mobile phone used for mobile voice or data communication over a network
of cell towers. In addition to the standard voice function of a mobile phone, cell
phone 22 preferably supports many additional services, and accessories, such as SMS
for text messaging, email, packet switching for access to the Internet, Bluetooth,
infrared, and GPS.
[0014] Illustratively, in some embodiments, the access system 20 is operably coupled to
data network 12. Data network 12 is preferably the Internet, which is a TCP/IP based
global network; however, the user of the term "Internet" herein shall be understood
to refer to at least a portion of any public interconnected electronic network which
interchanges data by packet-switching.
[0015] More specifically, access system 20 may utilize cellular phone network 11 and data
network 12 to interface with a wireless device 24, such as cell phone 22. Cellular
phone network 11 may comprise a variety of communication networks, including without
limitation the universal mobile telecommunications system (UTMS), global system for
mobile communication (GSM), and a code division of multiple access (CDMA) network,
or similar technology. Cellular phone network 11 utilizes cell tower 26 to establish
a wireless bi-directional transmission link between data network 12 and cell phone
22, which may comprise a wireless data link, such as the Evolution-Data Optimized
(EVDO), Enhanced Data rates for GSM Evolution (EDGE), 3G, 4G, LTE, WiMax, or other
wireless data connection. Similarly, other wireless appliances 28, such as Palm, Samsung,
and Motorola smartphones or other portable wireless appliances such an the iPod Touch
or Microsoft Zune may be configured to connect to access system 20 through access
node 50 to allow a user to access their hotel room.
[0016] According to the invention, access system 20 utilizes at least one access node 50
to interface with wireless device 24. Access node 50 is a wireless node implementing
a short-range wireless standard, such as Bluetooth®, which once paired with, provides
access to the Internet and data network 12 to wireless device 24 via internal network
54, in addition to server 60. Additionally, in a further form, access node 50 preferably
broadcasts a wireless signal, implementing a wireless local area network, such as
802.11 a/b/g/n or the like thereby providing Internet connectivity via a traditional
wireless network to hotel guests. According to the illustrative embodiment, access
node 50 broadcasts information which is linked to the location of the user device
over one or both of its short-range wireless signals to wireless device 24.
[0017] In the illustrative form, access system 20 includes a plurality of access nodes,
such as access node 50, where each node is strategically positioned near a specified
structure (i.e. a hotel room). The access nodes are preferably always in a discoverable
mode so that wireless devices 24 may be paired with them on demand in the event the
wireless device 24 is authorized, such as by having an authorized MAC address. In
a further form, the access nodes are not in a discoverable mode and the pairing of
the access nodes with wireless device 24 occurs prior to the user's arrival programmatically.
According to the invention, access node 50 is operatively connected to server 60 to
process and authenticate electronic unlock requests from wireless devices 24. Firewall
52 includes at least a hardware or software implemented firewall or other selected
security features to prevent external access to server 60 or access node 50.
[0018] The location information maintained by access node 50 is linked to the present/assigned
location of the node and is used in processing any unlock request. For example, an
access node on the fourth floor of a hotel in downtown Chicago may be assigned a unique
hotel identifier coupled with a hotel zone identifier. Alternatively, the node may
be assigned a single identifier which is then linked to its location by the wireless
device 24 or server 60.
[0019] Access system 20 additionally comprises a mechanical lock 34 for locking and unlocking
a structure 40 (partially shown). In the illustrated embodiment, a user gains access
to the structure 40 via door 32. In the illustrative embodiment, mechanical lock 34
is a mechanical door lock, which includes a locking mechanism similar to a common
entry or exterior lock, but is further capable of self-unlocking in response to an
electronic signal. For purposes of non-limiting example, mechanical lock 34 may include
a cam lock, rotary latch, electromechanical lock, magnetic lock, or the like. According
to the invention, lock 34 unlocks in response to an electrical signal sent from an
access node 50. The electrical signal is sent wirelessly, such as over a low-power
RF connection, such as a Zigbee® connection. In a further preferred form, the lock
34 returns to a locked state following the passage of a predetermined time period
or a user opening and closing the door following the receipt of an unlock signal.
In some additional forms, lock 34 or door 40 may also include a mechanical key slot,
key card, or other entry permitting authentication means 36 in addition to, or as
backup for, that described herein with respect to lock 34. In addition, it shall be
appreciated that system 20 may be applied to access restrictions other than locks
including, for example, an elevator control system providing limited access, a garage
door, or others access barriers, as described later.
[0020] According to the illustrated embodiment, server 60 operates to receive unlock requests
from access node 50 over internal network 54. In one form, the server 60 serves to
authenticate the unlock request or a portion thereof using a reservations and occupancy
database, while in other forms, the access node 50 may perform at least a portion
of the authentication. The server 60 processes each request corresponding to an unlock
request received by access node 50 from wireless device 24, and upon proper authentication,
confirms the granting of the request to access node 50 which then transmits an electronic
signal to the corresponding lock, such as lock 34, permitting access to the structure
40. While server 60 is described and illustrated as being a server, it should be understood
that server 60 may be any computer, including a client server arrangement. Server
60 interfaces with access node 50 by a wireless interconnection. Preferably, the connection
is a secured connection. A non-limiting example list of potential interfaces includes
IR, optical and RF. Additionally, the functions of server 60 and access node 50 may
be integrated into one computer system.
[0021] In one form, access node 50 is fixed at a single position, but in an alternate form,
access node 50 may be moveable, such as located within an elevator, and include a
floor detector, so that the node may broadcast information linked to the appropriate
floor upon which it is currently located. In a further form, an access node 50 is
fixed within an elevator and connected to the elevator control system to allow the
wireless device to communicate floor authorization information to access node 50.
As such, the wireless device 24 may broadcast a floor to which the user is authorized
to access so that the user may select that floor. In a further form, the elevator
may be automatically commanded to take the user to that floor by access node 50 or
server 60. As such, the user is enabled to access the floor or may experience a touchless
trip to the proper floor.
[0022] In still other embodiments, lock 34 is operably coupled to an override switch (not
shown) having an access disable state. Asserting the override switch prevents the
access system 20 from permitting access to corresponding structure 40. As one non-limiting
example, the override switch may be asserted when a guest engages a deadbolt or bar
latch within their hotel room. In some embodiments of the access system 20, the override
switch is incorporated into an electronic control, not shown here, accessible to the
user within structure 40.
[0023] A flowchart illustrating one set of steps performed in configuring a wireless device
24 for use in accessing a structure 40 according to one embodiment of the present
invention is shown. The process involves a wireless device 24 and the various other
components of access system 20. The following description is with continuing reference
to access system 20 of FIG. 1. As shown in FIG. 1, the wireless device is cell phone
22; however, it is understood that other networked appliances are also intended. It
shall be appreciated that while the process is described with respect to the reservation
and check-in process common for a hotel and hotel room the novel access system could
be adapted for application in various settings to provide for the same desired result.
As such, the confirmation and check-in process may be replaced with an employee authorization
process or the like depending upon the nature of the structure being utilized.
[0024] As shown in FIG. 2, the process begins at start point 200 with the novel service
receiving confirmation of the booking of a hotel stay for a user (stage 202). The
confirmation information preferably identifies the hotel and the user and includes
a check-in/check-out date along with details of the type of room requested/reserved.
In the preferred form, this confirmation information is received by server 60 as a
result of a hotel booking being made for a user either online, in person, or over
the phone.
[0025] Subsequent to receiving the confirmation information, a confirmation message is sent
to the wireless device 24 of the user (stage 204). Preferably, a phone number or e-mail
address corresponding to the user's wireless device is submitted along with the booking
information. The confirmation message may be in the form of an e-mail, SMS, text message,
or the like, sent over data network 12. The confirmation message includes a hotel
identifier, user identifier, and an access string. In the illustrated embodiment,
the confirmation message is handled by an installable application on the user's wireless
device 24 which is available for install to the user, such as via the hotel website,
a third-party website, other application source, or download source indicated in the
confirmation message. Preferably, the application is suitable for operation on various
mobile operating systems including Microsoft Mobile, Symbian OS, Palm OS, webOS, Mobile
Linux, Apple OSX (iPhone), and MXI. In other forms, the application used by wireless
device 24 may be browser-based and/or embedded software, to name a few non-limiting
examples.
[0026] As a result of receiving the hotel identifier, the application will be able to retrieve
access codes to enable wireless device 24 to automatically pair with access nodes
at the appropriate hotel upon arrival. Preferably, those access codes will only be
available the day of scheduled arrival or slightly before to prevent unauthorized
access. In a further form, the pairing may be established automatically prior to the
user and device 24 arriving at the hotel. In order to allow the user to access their
room, a specific room must be assigned to the user. Traditionally, this has occurred
either the day of check-in or during the check-in process. However, in the illustrative
form, the user is assigned a specific room automatically prior to or upon arriving
at the hotel. In one form, this occurs as a result of the wireless device 24 associated
with the user transmitting a check-in request to wireless node 50 which is then sent
to server 60 (stage 206). The check-in request is preferably triggered by the user's
wireless device 24 connecting to an access node 50 within the hotel indicated by the
hotel identifier of the confirmation message during the timeframe indicated by the
check-in/checkout dates. Alternatively, the check-in request may be transmitted via
an electronic kiosk in the hotel lobby, via the user device 24 over data network 12,
or an actual in-person check-in entered by a hotel representative. It is preferred
that the check-in request be sent over network 54 to server 60. In an alternate form,
the check-in request may be sent over the Internet to server 60 without the user being
present at the hotel.
[0027] Upon receiving a check-in request, access node 50 communicates with server 60 to
confirm the dates and access string provided by the wireless device 24 and assign
a room matching the reservation of the user (stage 208). In the preferred form, this
is accomplished by server 60 which interfaces with the hotel's management system to
store the appropriate access credential in an electronic database accessible to server
60. In addition, the server 60 associates a key code matching the user's confirmation
message with the assigned room. In an alternate form, step 208 may be omitted and
the access system 20 may simply automatically assign a room to the user, as described
above with respect to step 208, on the day of check-in absent an indication of the
user's presence at the hotel or the like.
[0028] The details of the assigned room, including its number and location, are then sent
in a return message to the user's wireless device 24 by server 60 via access node
50 (stage 210). This enables the user to send an electronic request for access to
the hotel room to access node 50 using wireless device 24. In one form, the MAC address
of the wireless device 24 is transmitted along with the request for access, and this
MAC address is similarly stored in the electronic database in association with the
assigned room. The process ends at end point 212. It shall be appreciated that this
process may be modified to accommodate more than one authorized hotel guest per room,
such as having two wireless devices authorized to enter the same hotel room, or allowing
a current guest to authorize the wireless device of another to access the hotel room
for any portion of their remaining stay.
[0029] In continuing the description of the embodiment described with respect to FIG. 2,
a flowchart illustrating one set of steps performed in allowing a user to access structure
40 using wireless device 24 and the various other components of access system 20 is
shown. The following description is with continuing reference to access system 20
of FIG. 1 and the description accompanying FIG. 2.
[0030] As shown in FIG. 3, the process begins at start point 300 with the wireless device
24 receiving location information linked to the current location of the user and wireless
device 24 from access node 50 (stage 302). In one form, this location information
is received or determined by wireless device 24 from access node 50 which is located
near the user's assigned room (represented by structure 40). In the preferred form,
access node 50 broadcasts a hotel identifier and a zone or area identifier which correspond
to zones, such as floor, wings, or portions thereof in a hotel. In an alternate form,
a unique identifier is sent along with a received unlock request by access node 50
which is then used as a lookup in a location table by wireless device 24 or by server
60. As a result, an added layer of security is provided by server 60 being configured
to only authorize requests from access node 50 (which is an access node within range
of the door requested to be unlocked) and subsequently authenticating those unlock
requests received to confirm that the requesting wireless device 24 is authorized.
[0031] Depending upon the application, structure 40 may be within the broadcast range of
access node 50, or the node 50 may be only located nearby, such as near the main elevator,
stairway, hallway, or other essential entranceway. Once the wireless device 24 is
within range of and is connected to access node 50, the wireless device 24 transmits
an unlock request, which is received by access node 50 and passed on to server 60
(stage 304). According to the invention, the access nodes 50 are configured to require
a predetermined signal strength prior to permitting an unlock request to be issued,
to ensure that the user is in close proximity to the door which access is requested
for. In the illustrated embodiment, this request is sent through internal network
54, but it shall be appreciated that the message may also be sent through another
wireless network, such as 802.11 or another similar technology. The unlock request
may include any of the following: hotel ID, room number, location information, user
name, reservation number, check-in/check-out dates. In addition, other information
may be included in the request.
[0032] According to the invention, the node 50 approximates the distance between itself
and wireless device 24 using a signal strength determination. A zone may then be set
(including a distance minimum or min/max range) which defines the distance the user
along with wireless device 24 would be from the node 50 when in an acceptable vicinity
of their assigned structure 40. If this determined distance does not match that set
by the operator, then any unlock request send will not be authorized.
[0033] Once an unlock request is received by server 60, server 60 authenticates the MAC
address of the wireless device as well as the validity of the current reservation
and confirms the request with access node 50. Upon receiving this confirmation, access
node 50 transmits an unlock command to the appropriate lock 34 using the Zigbee® connection
(step 306). Upon receiving the unlock request, the lock then unlocks the structure
and enables the user operating wireless device 24 to enter. The process ends at end
point 308.
[0034] Turning to FIG. 4, a user node suitable for use in a further embodiment of the present
invention is illustrated. User token 150 is device suitable for being queried by a
wireless device 24. Token 150 is optionally provided to the user by the hotel or structure
during authorization. Token 150 may include a coded unique identifier or some other
verifiable data. Prior to sending any request, such as an unlock request, wireless
device 24 may optionally be programmed to query for the presence of token 150 within
its presence. In the event that a token 150 having the verifiable data is not found,
then the request may be blocked. However, in the event the token 150 is within the
proximity of wireless device 24 the request may be transmitted. As such, the user
may be required to carry token 150 to ensure that wireless device 24 only functions
with access system 20 when in the presence of the authorized user. According to this
embodiment, token 150 is a passive Bluetooth node, but may be any other short-range
wireless device, such as RFID or the like. Preferably, token 150 does not require
its own power source.
[0035] In another form, access system 20 additionally comprises a parking access device
(not shown) such as a garage door or parking gate coupled to lock control unit 42
selectively permitting access to a parking lot or structure (not shown). In this illustrated
embodiment, a user is able to gain access to the parking area via the garage door
or parking gate. According to the preferred form, the parking access device permits
a user's vehicle access to the parking area in response to an electrical signal sent
from a control device. In one form, the electrical signal is sent wirelessly.
[0036] In further systems, a proximity node, similar to node 50, may be included in other
areas so as to permit a user to access structures, such as a hotel parking garage,
based upon the confirmation information sent to their wireless device or other information
as described herein. As such, the user's parking duration could be easily calculated
and charged to their hotel bill.
[0037] In still further systems, a notification process may be executed by server 60 such
that upon detecting a current hotel guest has left the hotel, a request for hospitality
and cleaning services may be generated. In one form, the server 60 may detect a hotel
guest leaving as a message sent from the user's wireless device upon passing by a
access node located near the user's assigned room and another access node at one of
the various exits to the hotel. Alternatively, the user opening the exit of the parking
garage using their wireless device may trigger such a notification.
1. An access system (20) allowing a user to access a structure (40) using a wireless
user device (24), the access system comprising:
the wireless user device (24)
a database storing access permissions identifying at least one wireless user device
authorized to access said structure (40) and one access node (50) authorized to permit
access to said structure (40);
a mechanical locking device (34) securing a door of said structure (40), said locking
device (34) having a short-range wireless receiver suitable for receiving unlock commands
and being configured to unlock said door upon receiving an unlock command;
an access node (50) positioned near said structure (40) comprising:
a first short-range wireless radio for receiving a wireless unlock request directly
from a wireless user device (24), and for subsequently and conditionally transmitting
an unlock request, wherein said wireless user device (24) is configured to, once said
wireless user device (24) is within range of and is connected to said access node
(50), transmit said wireless unlock request to the access node (50); and
a second short-range wireless radio for transmitting an unlock command to said mechanical
locking device to permit access to said structure in response to receiving a confirmation
of an authenticated unlock request; and
a server (60) operable to receive the unlock request associated with a wireless user
device (24) and a structure from said first short-range wireless radio of said access
node (50) to authenticate the received unlock request using said database and to transmit
a confirmation of an authenticated unlock request to said access node (50) upon authenticating
said unlock request using said database,
wherein said unlock request is authenticated only if received from an access node
(50) authorized to permit access to said structure and originated from a wireless
user device (24) authorized to access said structure; and
characterized in that said access node (50) is configured to determine the distance between itself and
the wireless user device (24) using the signal strength of the unlock request received
from the wireless user device (24) and to authorize the transmission of said unlock
request to the server by the first short wireless radio if the determined distance
is less than a predefined distance minimum and to forbid the transmission of said
unlock request if the predetermined distance is greater than the predefined distance.
2. The access system according to claim 1, characterised in that said first short-range wireless radio is a Bluetooth radio.
3. The access system according to claim 1, characterised in that said wireless user device (24) includes at least one access code for pairing with
at least one access node (50).
4. The access system according to claim 1, characterised in that said first short-range wireless radio is an 802.11 radio.
5. The access system according to claim 1, characterised in that said second short-range wireless radio is a ZigBee radio.
6. The access system according to claim 1, characterised in that said short-range wireless receiver of said locking device (34) is a ZigBee receiver.
7. The access system according to claim 2, characterised in that said second short-range wireless radio is a ZigBee radio.
8. The access system according to claim 7, characterised in that said mechanical locking device is located within the transmission range of said second
short-range wireless device.
9. The access system according to claim 8, characterised in that said mechanical locking device is located within the transmission range of said first
short-range wireless device.
10. The access system according to claim 1, characterised in that said wireless user device (24) is a mobile telephone.
11. The access system according to claim 2, characterised in that said wireless user device (24) is a mobile telephone.
12. The access system according to claim 11, characterised in that said wireless user device (24) includes a Bluetooth radio.
13. The access system according to claim 1, characterised in that said wireless user device (24) is a personal digital assistant (PDA).
14. The access system according to claim 1, characterised in that said structure (40) is a hotel room.
15. The access system according to claim 1 characterised in that said wireless unlock request includes the MAC address of the wireless user device.
1. Zugangssystem (20), das einem Benutzer unter Verwendung einer kabellosen Benutzervorrichtung
(24) Zugang zu einer Konstruktion (40) gewährt, wobei das Zugangssystem (20) Folgendes
aufweist:
die kabellose Benutzervorrichtung (24);
eine Datenbank, die Zugangsberechtigungen speichert, die wenigstens eine kabellose
Benutzervorrichtung, die zu Zugang zu der genannten Konstruktion (40) berechtigt ist,
und einen Zugangsknoten (50), der zum Gewähren von Zugang zu der genannten Konstruktion
(40) berechtigt ist, bezeichnen;
eine mechanische Schließvorrichtung (34), die eine Tür der genannten Konstruktion
(40) sichert, wobei die genannte Schließvorrichtung (34) einen kabellosen Nahbereichsempfänger
hat, der zum Empfangen von Entsicherungsbefehlen geeignet ist und zum Entsichern der
genannten Tür bei Empfang eines Entsicherungsbefehls konfiguriert ist;
einen Zugangsknoten (50), in der Nähe der genannten Konstruktion (40) positioniert,
der Folgendes aufweist:
ein erstes kabelloses Nahbereichsfunkgerät zum Empfangen einer kabellosen Entsicherungsanforderung
direkt von einer kabellosen Benutzervorrichtung (24) und zum anschließenden und bedingten
Senden einer Entsicherungsanforderung, wobei die genannte kabellose Benutzervorrichtung
(24) konfiguriert ist zum Senden der genannten kabellosen Entsicherungsanforderung
an den Zugangsknoten (50), sobald die genannte kabellose Benutzervorrichtung (24)
in Reichweite von und mit dem genannten Zugangsknoten (50) verbunden ist; und
ein zweites kabelloses Nahbereichsfunkgerät zum Senden eines Entsicherungsbefehls
an die genannte mechanische Schließvorrichtung, um als Reaktion auf das Empfangen
einer Bestätigung einer authentifizierten Entsicherungsanforderung Zugang zu der genannten
Konstruktion zu gewähren; und
einen Server (60), der bei Authentifizierung der genannten Entsicherungsanforderung
unter Verwendung der genannten Datenbank zum Empfangen der einer kabellosen Benutzervorrichtung
(24) und einer Konstruktion zugeordneten Entsicherungsanforderung von dem genannten
ersten Nahbereichsfunkgerät des genannten Zugangsknotens (50) zum Authentifizieren
der empfangenen Entsicherungsanforderung unter Verwendung der genannten Datenbank
und zum Senden einer Bestätigung einer authentifizierten Entsicherungsanforderung
an den genannten Zugangsknoten (50) funktionell ist,
wobei die genannte Entsicherungsanforderung nur authentifiziert wird, falls sie von
einem zum Gewähren von Zugang zu der genannten Konstruktion berechtigten Zugangsknoten
(50) her empfangen wird und von einer zu Zugang zu der genannten Konstruktion berechtigten
kabellosen Benutzervorrichtung (24) ausgeht; und
dadurch gekennzeichnet, dass der genannte Zugangsknoten (50) zum Bestimmen des Abstands zwischen ihm selbst und
der kabellosen Benutzervorrichtung (24) unter Verwendung der Signalstärke der von
der kabellosen Benutzervorrichtung (24) empfangenen Entsicherungsanforderung und zum
Erlauben der Sendung der genannten Entsicherungsanforderung an den Server durch das
erste kabellose Nahbereichsfunkgerät, falls der bestimmte Abstand kleiner als ein
vordefinierter Abstandsmindestwert ist, und zum Verbieten der Sendung der genannten
Entsicherungsanforderung, falls der vorherbestimmte Abstand größer als der vordefinierte
Abstand ist.
2. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass das genannte erste kabellose Nahbereichsfunkgerät ein Bluetooth-Funkgerät ist.
3. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass die genannte kabellose Benutzervorrichtung (24) wenigstens einen Zugangscode zur
Kopplung mit wenigstens einem Zugangsknoten (50) beinhaltet.
4. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass das genannte erste kabellose Nahbereichsfunkgerät ein 802.11-Funkgerät ist.
5. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass das genannte zweite kabellose Nahbereichsfunkgerät ein ZigBee-Funkgerät ist.
6. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass der genannte kabellose Nahbereichsempfänger der genannten Schließvorrichtung (34)
ein ZigBee-Empfänger ist.
7. Zugangssystem nach Anspruch 2, dadurch gekennzeichnet, dass das genannte zweite kabellose Nahbereichsfunkgerät ein ZigBee-Funkgerät ist.
8. Zugangssystem nach Anspruch 7, dadurch gekennzeichnet, dass die genannte mechanische Schließvorrichtung sich innerhalb der Sendereichweite der
genannten zweiten kabellosen Nahbereichsvorrichtung befindet.
9. Zugangssystem nach Anspruch 8, dadurch gekennzeichnet, dass sich die genannte mechanische Schließvorrichtung innerhalb der Sendereichweite der
genannten ersten kabellosen Nahbereichsvorrichtung befindet.
10. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass die genannte kabellose Benutzervorrichtung (24) ein Mobiltelefon ist.
11. Zugangssystem nach Anspruch 2, dadurch gekennzeichnet, dass die genannte kabellose Benutzervorrichtung (24) ein Mobiltelefon ist.
12. Zugangssystem nach Anspruch 11, dadurch gekennzeichnet, dass die genannte kabellose Benutzervorrichtung (24) ein Bluetooth-Funkgerät beinhaltet.
13. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass die genannte kabellose Benutzervorrichtung (24) ein Personal Digital Assistant (PDA)
ist.
14. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass die genannte Konstruktion (40) ein Hotelzimmer ist.
15. Zugangssystem nach Anspruch 1, dadurch gekennzeichnet, dass die genannte kabellose Entsicherungsanforderung die MAC-Adresse der kabellosen Benutzervorrichtung
beinhaltet.
1. Système d'accès (20) permettant à un utilisateur d'accéder à une structure (40) en
utilisant un dispositif d'utilisateur sans fil (24), le système d'accès comprenant
:
le dispositif d'utilisateur sans fil (24)
une base de données stockant des permissions d'accès qui identifient au moins un dispositif
d'utilisateur sans fil autorisé à accéder à ladite structure (40) et un nœud d'accès
(50) autorisé à permettre l'accès à ladite structure (40) ;
un dispositif de verrouillage mécanique (34) sécurisant une porte de ladite structure
(40), ledit dispositif de verrouillage (34) ayant un récepteur sans fil à courte portée
convenant à la réception d'instructions de déverrouillage et étant configuré pour
déverrouiller ladite porte lors de la réception d'une instruction de déverrouillage
;
un nœud d'accès (50) positionné près de ladite structure (40) comprenant :
une première radio sans fil à courte portée pour recevoir une requête de déverrouillage
sans fil directement à partir d'un dispositif d'utilisateur sans fil (24), et pour
émettre de manière subséquente et conditionnelle une requête de déverrouillage, dans
lequel ledit dispositif d'utilisateur sans fil (24) est configuré pour, une fois que
ledit dispositif d'utilisateur sans fil (24) se situe au sein de la portée de et est
connecté audit nœud d'accès (50), émettre ladite requête de déverrouillage sans fil
vers le nœud d'accès (50) ; et
une seconde radio sans fil à courte portée pour émettre une instruction de déverrouillage
vers ledit dispositif de verrouillage mécanique pour permettre l'accès à ladite structure
en réaction à la réception d'une confirmation d'une requête de déverrouillage authentifiée
; et
un serveur (60) exploitable pour recevoir la requête de déverrouillage associée à
un dispositif d'utilisateur sans fil (24) et une structure à partir de ladite première
radio sans fil à courte portée dudit nœud d'accès (50) afin d'authentifier la requête
de déverrouillage reçue grâce à l'utilisation de ladite base de données et émettre
une confirmation d'une requête de déverrouillage authentifiée vers ledit nœud d'accès
(50) après l'authentification de ladite requête de déverrouillage grâce à l'utilisation
de ladite base de données,
dans lequel ladite requête de déverrouillage est authentifiée uniquement si elle est
reçue à partir d'un nœud d'accès (50) autorisé à permettre l'accès à ladite structure
et provenant d'un dispositif d'utilisateur sans fil (24) autorisé à accéder à ladite
structure ; et
caractérisé en ce que ledit nœud d'accès (50) est configuré pour déterminer la distance entre lui-même
et le dispositif d'utilisateur sans fil (24) grâce à l'utilisation de l'intensité
de signal de la requête de déverrouillage reçue à partir du dispositif d'utilisateur
sans fil (24) et pour autoriser l'émission de ladite requête de déverrouillage vers
le serveur par la première radio sans fil à courte portée si la distance déterminée
est inférieure à un minimum de distance prédéfini et pour interdire l'émission de
ladite requête de déverrouillage si la distance prédéterminée est supérieure à la
distance prédéfinie.
2. Système d'accès selon la revendication 1, caractérisé en ce que ladite première radio sans fil à courte portée est une radio Bluetooth.
3. Système d'accès selon la revendication 1, caractérisé en ce que ledit dispositif d'utilisateur sans fil (24) inclut au moins un code d'accès pour
un appariement avec au moins un nœud d'accès (50).
4. Système d'accès selon la revendication 1, caractérisé en ce que ladite première radio sans fil à courte portée est une radio 802.11.
5. Système d'accès selon la revendication 1, caractérisé en ce que ladite seconde radio sans fil à courte portée est une radio ZigBee.
6. Système d'accès selon la revendication 1, caractérisé en ce que ledit récepteur sans fil à courte portée dudit dispositif de verrouillage (34) est
un récepteur ZigBee.
7. Système d'accès selon la revendication 2, caractérisé en ce que ladite seconde radio sans fil à courte portée est une radio ZigBee.
8. Système d'accès selon la revendication 7, caractérisé en ce que ledit dispositif de verrouillage mécanique est localisé au sein de la portée d'émission
dudit second dispositif sans fil à courte portée.
9. Système d'accès selon la revendication 8, caractérisé en ce que ledit dispositif de verrouillage mécanique est localisé au sein de la portée d'émission
dudit premier dispositif sans fil à courte portée.
10. Système d'accès selon la revendication 1, caractérisé en ce que ledit dispositif d'utilisateur sans fil (24) est un téléphone mobile.
11. Système d'accès selon la revendication 2, caractérisé en ce que ledit dispositif d'utilisateur sans fil (24) est un téléphone mobile.
12. Système d'accès selon la revendication 11, caractérisé en ce que ledit dispositif d'utilisateur sans fil (24) inclut une radio Bluetooth.
13. Système d'accès selon la revendication 1, caractérisé en ce que ledit dispositif d'utilisateur sans fil (24) est un assistant numérique personnel
(« personal digital assistant », PDA).
14. Système d'accès selon la revendication 1, caractérisé en ce que ladite structure (40) est une chambre d'hôtel.
15. Système d'accès selon la revendication 1 caractérisé en ce que ladite requête de déverrouillage sans fil inclut l'adresse MAC du dispositif d'utilisateur
sans fil.